2018
DOI: 10.14419/ijet.v7i4.15.21427
|View full text |Cite
|
Sign up to set email alerts
|

Mobile Application Design for Protecting the Data in Cloud Using Enhanced Technique of Encryption

Abstract: This paper provides an enhanced technique for improving the security and protecting the privacy of the cloud computing users by encrypting the data before it reached to server’s storage. Encrypting means the process of converting information or data into unreadable language to prevent unauthorized access. This paper will propose a mobile application design, which will allow the user to encrypt and decrypt the data hence maintaining security and privacy. In the proposed system design, the AES Algorithm will han… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…Even with brute force attacks, it requires a substantial amount of time and immense computational resources. AES supports multiple key lengths, allowing users to choose different security levels as per their requirements [4]. Furthermore, AES exhibits exceptional performance capabilities.…”
Section: Common Encryption Algorithms and Protocolsmentioning
confidence: 99%
“…Even with brute force attacks, it requires a substantial amount of time and immense computational resources. AES supports multiple key lengths, allowing users to choose different security levels as per their requirements [4]. Furthermore, AES exhibits exceptional performance capabilities.…”
Section: Common Encryption Algorithms and Protocolsmentioning
confidence: 99%
“…Cryptography is a secret of writing where it enables people to send or store sensitive information in the form of unreadable or non-understandable language [3]. In locationbased encryption, it builds from established cryptographic algorithm techniques which are asymmetric algorithm and symmetric algorithm.…”
Section: Cryptographic Techniquesmentioning
confidence: 99%
“…Location-based encryption or geo-encryption is referred as any method of encryption where the information, were encrypted and can be decrypted at only a specific location [1]. Geo-encryption is an enhancement of conventional cryptography process where it provides another security layer on the available encryption protocol using the recipient location information to generate the encryption key [2], [3]. The original information will not be revealed if there is any attempt to decrypt the data at other locations as the encrypted file will can be only decrypted back if the location of decryption is matched with the location information inside the generated key.…”
Section: Introductionmentioning
confidence: 99%